<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Tips &amp;amp; Tricks: Palo Alto Global Counters for Layer 1 to Layer 4 issues  troubleshooting like MTU and DOS in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-palo-alto-global-counters-for-layer-1-to-layer-4/ta-p/1232954</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wanted to share some knowledge I've gained about investigating common Layer 1 to Layer 4 issues, such as MTU mismatches and DoS attacks, using key Palo Alto Networks firewall features like Global Counters, Flow Debug, and packet captures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first steps in troubleshooting these issues are always to check your routing, run a policy trace, and review the global counters. Once you have a clearer picture, you can move on to more advanced tools like packet capture and flow debug. The following links provide a great starting point for those tools:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-cli-quick-start/use-the-cli/test-the-configuration/test-policy-matches" target="_blank" rel="noopener"&gt;Test Policy Matches&lt;/A&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank" rel="noopener"&gt;Getting Started: Packet Capture - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-flow-basic-debugging/ta-p/545999" target="_blank" rel="noopener"&gt;Tips &amp;amp; Tricks: Flow Basic Debugging&lt;/A&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;1. MTU Investigation&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One of the first issues to investigate is an MTU mismatch. This can happen, for example, with a Palo Alto GRE or IPSEC tunnel to another system where the MTU between the two systems is too small, or the MTU of the packets traversing the firewall is too big and the "DF" (Don't Fragment) bit is set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To add filters you can use the cli as shown in articles&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-flow-basic-debugging/ta-p/545999" target="_blank" rel="noopener"&gt;Tips &amp;amp; Tricks: Flow Basic Debugging&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-app-id-debugging/ta-p/1232109" target="_blank" rel="noopener"&gt;Tips &amp;amp; Tricks: App-ID Debugging | Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_3-1751356122244.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68253i9AF772D28E283F38/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_3-1751356122244.png" alt="nikoolayy1_3-1751356122244.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To demonstrate the most basic test, you can set the MTU on a test client-facing interface to 1400 and run a ping command. After the test, you can use the commands &lt;CODE&gt;show counter global filter delta yes&lt;/CODE&gt; and &lt;CODE&gt;show counter global filter delta yes severity drop&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;CODE&gt;delta yes&lt;/CODE&gt; shows you new statistics that were not seen in the previous command execution.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;CODE&gt;severity drop&lt;/CODE&gt; allows you to focus specifically on dropped traffic.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you run the command without the &lt;CODE&gt;severity drop&lt;/CODE&gt; filter, you can see other interesting things, such as how an application was identified or if there is unicast or multicast routing. I have described application identification in &lt;A href="https://live.paloaltonetworks.com/t5/general-articles/how-to-write-palo-alto-networks-custom-vulnerability-and/ta-p/1228494" target="_blank" rel="noopener"&gt;How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples | Palo Alto Networks&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show counter global filter delta yes

Global counters:
Elapsed time since last sampling: 45.110 seconds

name                                   value     rate severity  category  aspect    description
--------------------------------------------------------------------------------
pkt_recv                                 418        9 info      packet    pktproc   Packets received
pkt_runtc_np                             418        9 info      packet    pktproc   runtc flow_np
pkt_sent                                   7        0 info      packet    pktproc   Packets transmitted
pkt_sent_host                              3        0 info      packet    pktproc   Packets successfully transmitted to host interface
pkt_stp_rcv                               23        0 info      packet    pktproc   STP BPDU packets received
session_allocated                          7        0 info      session   resource  Sessions allocated
session_freed                              8        0 info      session   resource  Sessions freed
session_installed                          7        0 info      session   resource  Sessions installed
flow_rcv_dot1q_tag_err                   309        6 drop      flow      parse     Packets dropped: 802.1q tag not configured
flow_no_interface                        309        6 drop      flow      parse     Packets dropped: invalid interface
flow_fwd_l3_bcast_drop                     1        0 drop      flow      forward   Packets dropped: unhandled IP broadcast
flow_fwd_l3_mcast_drop                    44        0 drop      flow      forward   Packets dropped: no route for IP multicast
flow_icmp_err_not_passing_thru             1        0 drop      flow      ipsec     ICMP error packet dropped: no IP configured on the interface
flow_fwd_ip_df_drop                        1        0 drop      flow      forward   Packets dropped: exceeded MTU but DF bit present
flow_ip6_mcast_off                        27        0 info      flow      pktproc   Packets received: IPv6 multicast pkts with flow off
flow_bcast_pkt_rcv                         1        0 info      flow      parse     IP broadcast pkt received
flow_arp_pkt_rcv                          32        0 info      flow      arp       ARP packets received
flow_arp_pkt_replied                       1        0 info      flow      arp       ARP requests replied
flow_arp_rcv_gratuitous                    1        0 info      flow      arp       Gratuitous ARP packets received
flow_host_pkt_xmt                          3        0 info      flow      mgmt      Packets transmitted to control plane
flow_ip_cksm_sw_validation                 7        0 info      flow      pktproc   Packets for which IP checksum validation was done in software
appid_ident_by_icmp                        7        0 info      appid     pktproc   Application identified by icmp type
dfa_sw                                     7        0 info      dfa       pktproc   The total number of dfa match using software
ctd_pscan_sw                               7        0 info      ctd       pktproc   The total usage of software for pscan
ctd_process                                7        0 info      ctd       pktproc   session processed by ctd
ctd_pkt_slowpath                           7        0 info      ctd       pktproc   Packets processed by slowpath
log_traffic_cnt                            3        0 info      log       system    Number of traffic logs
log_suppress                               8        0 info      log       system    Logs suppressed by log suppression
--------------------------------------------------------------------------------
Total counters shown: 28
--------------------------------------------------------------------------------
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; I once saw an issue where the &lt;CODE&gt;intrazone-default&lt;/CODE&gt; rule was set to deny. In the global counters, the drop reason was seen as "Session setup: denied by policy," which masked the true MTU drop reason. The workaround was to create a specific rule for the client-facing zone that allows the traffic under investigation. The true MTU counter was only visible after the security rule was fixed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_1-1751354923520.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68251i6B88A2A666996874/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_1-1751354923520.png" alt="nikoolayy1_1-1751354923520.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;The counter "Packets dropped: exceeded MTU but DF bit present" is seen in the second execution of the command after the issue with the security zone rule is fixed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1751354721007.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68250i53356CFE6CBA3973/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1751354721007.png" alt="nikoolayy1_0-1751354721007.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Extra links:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXXCA0" target="_blank" rel="noopener"&gt;How does the Palo Alto Networks Firewall Manage Fragmented Traf... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS" target="_blank" rel="noopener"&gt;How to check global counters for a specific source and destinat... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaVCAS" target="_blank" rel="noopener"&gt;What is the significance of Global Counters? - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXOCA0" target="_blank" rel="noopener"&gt;How to Troubleshoot Using Counters via the CLI - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;2. DOS investigation&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DoS protection on Palo Alto Networks firewalls is based on Zone Protection profiles or DoS Protection security rules as shown in&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/zone-protection-and-dos-protection" target="_blank" rel="noopener"&gt;Zone Protection and DoS Protection&lt;/A&gt;.. The global counters are a great way to see traffic dropped by DoS policies. This is useful because if you correlate these drops with CPU and memory commands, you may discover that a spike in resource usage was not caused by a memory leak, but by a DoS attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A useful command for this is &lt;CODE&gt;show counter global filter aspect dos delta yes&lt;/CODE&gt;. You can easily test this with a DoS policy that drops ICMP and just run a ping. I've had issues triggering this with a Zone Protection profile on a test VM, but a DoS policy worked fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_2-1751360016326.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68258iCBC8BB7A3522143F/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_2-1751360016326.png" alt="nikoolayy1_2-1751360016326.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_3-1751360091271.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68259i6C121864451D21F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_3-1751360091271.png" alt="nikoolayy1_3-1751360091271.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The &lt;CODE&gt;show counter global filter aspect dos delta yes&lt;/CODE&gt; command is useful even if you can't limit the global counters by source and destination, though limiting to a specific source and destination will still work. as seen below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_1-1751359844874.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68257iD15D7ACB02E438C8/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_1-1751359844874.png" alt="nikoolayy1_1-1751359844874.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1751367953695.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68260iC1526D72291E2424/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1751367953695.png" alt="nikoolayy1_0-1751367953695.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, &lt;CODE&gt;show counter global filter category ssl delta yes&lt;/CODE&gt; is useful, as Layer 7 DoS attacks inside SSL (usually HTTPS web traffic) can also cause CPU and memory spikes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1751359037749.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68256i83B569539550606A/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1751359037749.png" alt="nikoolayy1_0-1751359037749.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If the issue turns out to be a resource leak due to a bug, an upgrade can be planned. As a workaround before that, you can schedule a process restart at night for the process causing the issue, as I've shown in my other article, &lt;A class="ng-star-inserted" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTqCAK" target="_blank" rel="noopener"&gt;Automating the Palo Alto NGFW's Process/Deamon Restarts&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;3.&amp;nbsp;Strata Cloud Manager/&lt;EM&gt;AIOps&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto's Strata Cloud Manager, which can manage Palo Alto Networks NGFWs and Prisma Access from a single web interface, now includes the &lt;STRONG&gt;AIOps&lt;/STRONG&gt; feature. AIOps ingests global counters and can generate alerts for things like MTU traffic issues or when a DoS rule is triggered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a free version and a premium one, which are described in the link &lt;A class="ng-star-inserted" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTqCAK" target="_blank" rel="noopener"&gt;Free and Premium Features&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1754396231537.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68761i406C8D98FEEFA6B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1754396231537.png" alt="nikoolayy1_0-1754396231537.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;U&gt;With AIOps, you can even configure email or SMS notifications for these alerts!&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_1-1754396679574.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68762i0FE43D9BBE38A32F/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_1-1754396679574.png" alt="nikoolayy1_1-1754396679574.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_2-1754396948093.png" style="width: 475px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68763i379EE0EDE04031B6/image-dimensions/475x545?v=v2" width="475" height="545" role="button" title="nikoolayy1_2-1754396948093.png" alt="nikoolayy1_2-1754396948093.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Extra links:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClddCAC" target="_blank" rel="noopener"&gt;CLI commands to verify the DOS functionality on Palo Alto Netwo... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kFJGCA2" target="_blank" rel="noopener"&gt;How to mitigate High DP CPU issue due to High Application Usage - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRTCA0" target="_blank" rel="noopener"&gt;How to Troubleshoot High Dataplane CPU - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXwCAK" target="_blank" rel="noopener"&gt;How to Interpret: show running resource-monitor - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PNtHCAW" target="_blank" rel="noopener"&gt;How To Check The Dataplane Config Memory Available - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRCCA0" target="_blank" rel="noopener"&gt;How to View how many SSL Sessions are Decrypted - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClhdCAC" target="_blank" rel="noopener"&gt;How to Calculate the Number of SSL Proxied Sessions - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw/incidents-and-alerts/alerts-reference/alerts-reference-health-premium" target="_blank" rel="noopener"&gt;Premium Health Alerts&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 11 Aug 2025 07:02:03 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2025-08-11T07:02:03Z</dc:date>
    <item>
      <title>Tips &amp; Tricks: Palo Alto Global Counters for Layer 1 to Layer 4 issues  troubleshooting like MTU and DOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-palo-alto-global-counters-for-layer-1-to-layer-4/ta-p/1232954</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wanted to share some knowledge I've gained about investigating common Layer 1 to Layer 4 issues, such as MTU mismatches and DoS attacks, using key Palo Alto Networks firewall features like Global Counters, Flow Debug, and packet captures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first steps in troubleshooting these issues are always to check your routing, run a policy trace, and review the global counters. Once you have a clearer picture, you can move on to more advanced tools like packet capture and flow debug. The following links provide a great starting point for those tools:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-cli-quick-start/use-the-cli/test-the-configuration/test-policy-matches" target="_blank" rel="noopener"&gt;Test Policy Matches&lt;/A&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank" rel="noopener"&gt;Getting Started: Packet Capture - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-flow-basic-debugging/ta-p/545999" target="_blank" rel="noopener"&gt;Tips &amp;amp; Tricks: Flow Basic Debugging&lt;/A&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;1. MTU Investigation&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One of the first issues to investigate is an MTU mismatch. This can happen, for example, with a Palo Alto GRE or IPSEC tunnel to another system where the MTU between the two systems is too small, or the MTU of the packets traversing the firewall is too big and the "DF" (Don't Fragment) bit is set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To add filters you can use the cli as shown in articles&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-flow-basic-debugging/ta-p/545999" target="_blank" rel="noopener"&gt;Tips &amp;amp; Tricks: Flow Basic Debugging&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-app-id-debugging/ta-p/1232109" target="_blank" rel="noopener"&gt;Tips &amp;amp; Tricks: App-ID Debugging | Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_3-1751356122244.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68253i9AF772D28E283F38/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_3-1751356122244.png" alt="nikoolayy1_3-1751356122244.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To demonstrate the most basic test, you can set the MTU on a test client-facing interface to 1400 and run a ping command. After the test, you can use the commands &lt;CODE&gt;show counter global filter delta yes&lt;/CODE&gt; and &lt;CODE&gt;show counter global filter delta yes severity drop&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;CODE&gt;delta yes&lt;/CODE&gt; shows you new statistics that were not seen in the previous command execution.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;CODE&gt;severity drop&lt;/CODE&gt; allows you to focus specifically on dropped traffic.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you run the command without the &lt;CODE&gt;severity drop&lt;/CODE&gt; filter, you can see other interesting things, such as how an application was identified or if there is unicast or multicast routing. I have described application identification in &lt;A href="https://live.paloaltonetworks.com/t5/general-articles/how-to-write-palo-alto-networks-custom-vulnerability-and/ta-p/1228494" target="_blank" rel="noopener"&gt;How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples | Palo Alto Networks&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show counter global filter delta yes

Global counters:
Elapsed time since last sampling: 45.110 seconds

name                                   value     rate severity  category  aspect    description
--------------------------------------------------------------------------------
pkt_recv                                 418        9 info      packet    pktproc   Packets received
pkt_runtc_np                             418        9 info      packet    pktproc   runtc flow_np
pkt_sent                                   7        0 info      packet    pktproc   Packets transmitted
pkt_sent_host                              3        0 info      packet    pktproc   Packets successfully transmitted to host interface
pkt_stp_rcv                               23        0 info      packet    pktproc   STP BPDU packets received
session_allocated                          7        0 info      session   resource  Sessions allocated
session_freed                              8        0 info      session   resource  Sessions freed
session_installed                          7        0 info      session   resource  Sessions installed
flow_rcv_dot1q_tag_err                   309        6 drop      flow      parse     Packets dropped: 802.1q tag not configured
flow_no_interface                        309        6 drop      flow      parse     Packets dropped: invalid interface
flow_fwd_l3_bcast_drop                     1        0 drop      flow      forward   Packets dropped: unhandled IP broadcast
flow_fwd_l3_mcast_drop                    44        0 drop      flow      forward   Packets dropped: no route for IP multicast
flow_icmp_err_not_passing_thru             1        0 drop      flow      ipsec     ICMP error packet dropped: no IP configured on the interface
flow_fwd_ip_df_drop                        1        0 drop      flow      forward   Packets dropped: exceeded MTU but DF bit present
flow_ip6_mcast_off                        27        0 info      flow      pktproc   Packets received: IPv6 multicast pkts with flow off
flow_bcast_pkt_rcv                         1        0 info      flow      parse     IP broadcast pkt received
flow_arp_pkt_rcv                          32        0 info      flow      arp       ARP packets received
flow_arp_pkt_replied                       1        0 info      flow      arp       ARP requests replied
flow_arp_rcv_gratuitous                    1        0 info      flow      arp       Gratuitous ARP packets received
flow_host_pkt_xmt                          3        0 info      flow      mgmt      Packets transmitted to control plane
flow_ip_cksm_sw_validation                 7        0 info      flow      pktproc   Packets for which IP checksum validation was done in software
appid_ident_by_icmp                        7        0 info      appid     pktproc   Application identified by icmp type
dfa_sw                                     7        0 info      dfa       pktproc   The total number of dfa match using software
ctd_pscan_sw                               7        0 info      ctd       pktproc   The total usage of software for pscan
ctd_process                                7        0 info      ctd       pktproc   session processed by ctd
ctd_pkt_slowpath                           7        0 info      ctd       pktproc   Packets processed by slowpath
log_traffic_cnt                            3        0 info      log       system    Number of traffic logs
log_suppress                               8        0 info      log       system    Logs suppressed by log suppression
--------------------------------------------------------------------------------
Total counters shown: 28
--------------------------------------------------------------------------------
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; I once saw an issue where the &lt;CODE&gt;intrazone-default&lt;/CODE&gt; rule was set to deny. In the global counters, the drop reason was seen as "Session setup: denied by policy," which masked the true MTU drop reason. The workaround was to create a specific rule for the client-facing zone that allows the traffic under investigation. The true MTU counter was only visible after the security rule was fixed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_1-1751354923520.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68251i6B88A2A666996874/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_1-1751354923520.png" alt="nikoolayy1_1-1751354923520.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;The counter "Packets dropped: exceeded MTU but DF bit present" is seen in the second execution of the command after the issue with the security zone rule is fixed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1751354721007.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68250i53356CFE6CBA3973/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1751354721007.png" alt="nikoolayy1_0-1751354721007.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Extra links:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXXCA0" target="_blank" rel="noopener"&gt;How does the Palo Alto Networks Firewall Manage Fragmented Traf... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS" target="_blank" rel="noopener"&gt;How to check global counters for a specific source and destinat... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaVCAS" target="_blank" rel="noopener"&gt;What is the significance of Global Counters? - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXOCA0" target="_blank" rel="noopener"&gt;How to Troubleshoot Using Counters via the CLI - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;2. DOS investigation&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DoS protection on Palo Alto Networks firewalls is based on Zone Protection profiles or DoS Protection security rules as shown in&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/zone-protection-and-dos-protection" target="_blank" rel="noopener"&gt;Zone Protection and DoS Protection&lt;/A&gt;.. The global counters are a great way to see traffic dropped by DoS policies. This is useful because if you correlate these drops with CPU and memory commands, you may discover that a spike in resource usage was not caused by a memory leak, but by a DoS attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A useful command for this is &lt;CODE&gt;show counter global filter aspect dos delta yes&lt;/CODE&gt;. You can easily test this with a DoS policy that drops ICMP and just run a ping. I've had issues triggering this with a Zone Protection profile on a test VM, but a DoS policy worked fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_2-1751360016326.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68258iCBC8BB7A3522143F/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_2-1751360016326.png" alt="nikoolayy1_2-1751360016326.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_3-1751360091271.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68259i6C121864451D21F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_3-1751360091271.png" alt="nikoolayy1_3-1751360091271.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The &lt;CODE&gt;show counter global filter aspect dos delta yes&lt;/CODE&gt; command is useful even if you can't limit the global counters by source and destination, though limiting to a specific source and destination will still work. as seen below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_1-1751359844874.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68257iD15D7ACB02E438C8/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_1-1751359844874.png" alt="nikoolayy1_1-1751359844874.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1751367953695.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68260iC1526D72291E2424/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1751367953695.png" alt="nikoolayy1_0-1751367953695.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, &lt;CODE&gt;show counter global filter category ssl delta yes&lt;/CODE&gt; is useful, as Layer 7 DoS attacks inside SSL (usually HTTPS web traffic) can also cause CPU and memory spikes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1751359037749.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68256i83B569539550606A/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1751359037749.png" alt="nikoolayy1_0-1751359037749.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If the issue turns out to be a resource leak due to a bug, an upgrade can be planned. As a workaround before that, you can schedule a process restart at night for the process causing the issue, as I've shown in my other article, &lt;A class="ng-star-inserted" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTqCAK" target="_blank" rel="noopener"&gt;Automating the Palo Alto NGFW's Process/Deamon Restarts&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;3.&amp;nbsp;Strata Cloud Manager/&lt;EM&gt;AIOps&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto's Strata Cloud Manager, which can manage Palo Alto Networks NGFWs and Prisma Access from a single web interface, now includes the &lt;STRONG&gt;AIOps&lt;/STRONG&gt; feature. AIOps ingests global counters and can generate alerts for things like MTU traffic issues or when a DoS rule is triggered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a free version and a premium one, which are described in the link &lt;A class="ng-star-inserted" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTqCAK" target="_blank" rel="noopener"&gt;Free and Premium Features&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1754396231537.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68761i406C8D98FEEFA6B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_0-1754396231537.png" alt="nikoolayy1_0-1754396231537.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;U&gt;With AIOps, you can even configure email or SMS notifications for these alerts!&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_1-1754396679574.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68762i0FE43D9BBE38A32F/image-size/large?v=v2&amp;amp;px=999" role="button" title="nikoolayy1_1-1754396679574.png" alt="nikoolayy1_1-1754396679574.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_2-1754396948093.png" style="width: 475px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68763i379EE0EDE04031B6/image-dimensions/475x545?v=v2" width="475" height="545" role="button" title="nikoolayy1_2-1754396948093.png" alt="nikoolayy1_2-1754396948093.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Extra links:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClddCAC" target="_blank" rel="noopener"&gt;CLI commands to verify the DOS functionality on Palo Alto Netwo... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kFJGCA2" target="_blank" rel="noopener"&gt;How to mitigate High DP CPU issue due to High Application Usage - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRTCA0" target="_blank" rel="noopener"&gt;How to Troubleshoot High Dataplane CPU - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXwCAK" target="_blank" rel="noopener"&gt;How to Interpret: show running resource-monitor - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PNtHCAW" target="_blank" rel="noopener"&gt;How To Check The Dataplane Config Memory Available - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRCCA0" target="_blank" rel="noopener"&gt;How to View how many SSL Sessions are Decrypted - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClhdCAC" target="_blank" rel="noopener"&gt;How to Calculate the Number of SSL Proxied Sessions - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw/incidents-and-alerts/alerts-reference/alerts-reference-health-premium" target="_blank" rel="noopener"&gt;Premium Health Alerts&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Aug 2025 07:02:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-palo-alto-global-counters-for-layer-1-to-layer-4/ta-p/1232954</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2025-08-11T07:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: Tips &amp; Tricks: Palo Alto Global Counters for Layer 1 to Layer 4 issues  troubleshooting like MTU and DOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-palo-alto-global-counters-for-layer-1-to-layer-4/tac-p/1235760#M823</link>
      <description>&lt;P&gt;This is excellent and highly useful ! Thanks a bunch for these valuable troubleshooting steps&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":raising_hands:"&gt;🙌&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 07:14:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-palo-alto-global-counters-for-layer-1-to-layer-4/tac-p/1235760#M823</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-08-11T07:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: Tips &amp; Tricks: Palo Alto Global Counters for Layer 1 to Layer 4 issues  troubleshooting like MTU and DOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-palo-alto-global-counters-for-layer-1-to-layer-4/tac-p/1236947#M827</link>
      <description>&lt;P&gt;Wow That´s okay&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 16:01:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-palo-alto-global-counters-for-layer-1-to-layer-4/tac-p/1236947#M827</guid>
      <dc:creator>J.Lopes154290</dc:creator>
      <dc:date>2025-08-29T16:01:54Z</dc:date>
    </item>
  </channel>
</rss>

